SlideShare uma empresa Scribd logo
1 de 12
The Three Laws
of Cyber Security
Foundation stone of modern Cyber security
Jiri Napravnik / http://rule.salamandr.cz
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
● Computer security was a problem for many years.
● Computer security is a big problem, which costs a lot of money
and time, but the situation continues to deteriorate.
What if the current solution built on the wrong basis ??
What if we think about the problem wrong?
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
● SW development is an exact discipline, where it is possible to
clearly describe everything, programmed and tested. No laws of
physics, no chemical reaction.
● SW development is solely the work of people.
● The error in the software is not caused by our ignorance of the
laws of nature, but a poor job of analysts, programmers and
testers.
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
Program ApolloProgram Apollo
Many scientists, technicians and workers was involved in
the project Apollo, from 1962 to 1969.
In the course of this project have been resolved many new
challenges in physics, chemistry, management of large
projects and many other areas.
In 1969, indeed the crew of Apollo 11 successfully landed
on the Moon and returned to Earth.
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
SW developmentSW development
● Creating programs are purely human activity.
● Analysts, programmers and testers in the development of
operating systems and applications do not have to respect
the physical or chemical properties of materials.
● SW Authors need not examine, understand and respect
the cosmic radiation, gravity or other natural laws like
in the Apollo program.
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
SW developmentSW development
Over the 15 years, since the release of Windows 2000 / XP,
failed to solve the problems with viruses.
This si a huge difference from the Apollo program.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
● In Aviation exists traceability of spare parts according to
EN 9120, FAA AC21 and next rules.
Aircraft captain has confidence that the aircraft has original
parts.
● In the ICT environment fixed point missed.
For the IT environment is propose the ThreeFor the IT environment is propose the Three
Laws of Cyber security.Laws of Cyber security.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 1 - Checksums must be always the same
Law no. 2 - The network shall enable checksum verification
Law no. 3 - The operating system has to verify the checksum
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 1 - Checksums must be always the same
The checksum of the file on the user's device must be always
the same as the checksum of the same file by the SW author.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 2 – The network shall enable checksum verification
The network has to enable checksum verification of file from
user's device with the recorded of
the checksum from SW authors.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 3 – The operating system has to verify the
checksum
The operating system has to verify the checksum before
starting an application and before using unverified system files
***
Computer viruses and hackers then will have a very, veryComputer viruses and hackers then will have a very, very
limited space for the attacks.limited space for the attacks.
The Three Laws of Cyber Security definesThe Three Laws of Cyber Security defines
foundation stone of modern Cyber Securityfoundation stone of modern Cyber Security
It's time for a changeIt's time for a change
Cyber securityCyber security
Jiri NapravnikJiri Napravnik
napravnik.jiri@salamandr.cznapravnik.jiri@salamandr.cz
http://rule.salamandr.czhttp://rule.salamandr.cz

Mais conteúdo relacionado

Destaque

Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJiří Napravnik
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůJiří Napravnik
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnostiJiří Napravnik
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnostiJiří Napravnik
 
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016Profinit
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber SecurityJiří Napravnik
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR) Jiří Napravnik
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firemJiří Napravnik
 

Destaque (8)

Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnosti
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborů
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnosti
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti
 
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firem
 

Semelhante a The Three Laws of Cyber Security

Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsC4Media
 
The Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxThe Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxJamie Coleman
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computingijtsrd
 
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAn Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAhmed Zerouali
 
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...PROFIBUS and PROFINET InternationaI - PI UK
 
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptxWhy Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptxJamie Coleman
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Graham Smith
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...AVEVA
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 

Semelhante a The Three Laws of Cyber Security (20)

Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient Systems
 
The Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxThe Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptx
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
 
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAn Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
 
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
 
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptxWhy Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
 
Power station monitoring and cyber security
Power station monitoring and cyber securityPower station monitoring and cyber security
Power station monitoring and cyber security
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 

Mais de Jiří Napravnik

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíJiří Napravnik
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraJiří Napravnik
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basicsJiří Napravnik
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiJiří Napravnik
 
The five fatal flaw in cyber security
The five fatal flaw in cyber securityThe five fatal flaw in cyber security
The five fatal flaw in cyber securityJiří Napravnik
 

Mais de Jiří Napravnik (6)

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcí
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítra
 
7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basics
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnosti
 
The five fatal flaw in cyber security
The five fatal flaw in cyber securityThe five fatal flaw in cyber security
The five fatal flaw in cyber security
 

Último

Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Christina Parmionova
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 

Último (20)

Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 

The Three Laws of Cyber Security

  • 1. The Three Laws of Cyber Security Foundation stone of modern Cyber security Jiri Napravnik / http://rule.salamandr.cz
  • 2. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security ● Computer security was a problem for many years. ● Computer security is a big problem, which costs a lot of money and time, but the situation continues to deteriorate. What if the current solution built on the wrong basis ?? What if we think about the problem wrong?
  • 3. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security ● SW development is an exact discipline, where it is possible to clearly describe everything, programmed and tested. No laws of physics, no chemical reaction. ● SW development is solely the work of people. ● The error in the software is not caused by our ignorance of the laws of nature, but a poor job of analysts, programmers and testers.
  • 4. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security Program ApolloProgram Apollo Many scientists, technicians and workers was involved in the project Apollo, from 1962 to 1969. In the course of this project have been resolved many new challenges in physics, chemistry, management of large projects and many other areas. In 1969, indeed the crew of Apollo 11 successfully landed on the Moon and returned to Earth.
  • 5. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security SW developmentSW development ● Creating programs are purely human activity. ● Analysts, programmers and testers in the development of operating systems and applications do not have to respect the physical or chemical properties of materials. ● SW Authors need not examine, understand and respect the cosmic radiation, gravity or other natural laws like in the Apollo program.
  • 6. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security SW developmentSW development Over the 15 years, since the release of Windows 2000 / XP, failed to solve the problems with viruses. This si a huge difference from the Apollo program.
  • 7. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security ● In Aviation exists traceability of spare parts according to EN 9120, FAA AC21 and next rules. Aircraft captain has confidence that the aircraft has original parts. ● In the ICT environment fixed point missed. For the IT environment is propose the ThreeFor the IT environment is propose the Three Laws of Cyber security.Laws of Cyber security.
  • 8. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 1 - Checksums must be always the same Law no. 2 - The network shall enable checksum verification Law no. 3 - The operating system has to verify the checksum
  • 9. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 1 - Checksums must be always the same The checksum of the file on the user's device must be always the same as the checksum of the same file by the SW author.
  • 10. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 2 – The network shall enable checksum verification The network has to enable checksum verification of file from user's device with the recorded of the checksum from SW authors.
  • 11. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 3 – The operating system has to verify the checksum The operating system has to verify the checksum before starting an application and before using unverified system files *** Computer viruses and hackers then will have a very, veryComputer viruses and hackers then will have a very, very limited space for the attacks.limited space for the attacks.
  • 12. The Three Laws of Cyber Security definesThe Three Laws of Cyber Security defines foundation stone of modern Cyber Securityfoundation stone of modern Cyber Security It's time for a changeIt's time for a change Cyber securityCyber security Jiri NapravnikJiri Napravnik napravnik.jiri@salamandr.cznapravnik.jiri@salamandr.cz http://rule.salamandr.czhttp://rule.salamandr.cz